default search action
IEEE/ACM Transactions on Networking, Volume 17
Volume 17, Number 1, February 2009
- Piet Van Mieghem, Jasmina Omic, Robert E. Kooij:
Virus spread in networks. 1-14 - Yi Xie, Shun-Zheng Yu:
Monitoring the application-layer DDoS attacks for popular websites. 15-25 - Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci, Edward W. Knightly:
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. 26-39 - Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:
Mitigating attacks on open functionality in SMS-capable cellular networks. 40-53 - Yi Xie, Shun-Zheng Yu:
A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. 54-65 - Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb:
Detecting network-wide and router-specific misconfigurations through data mining. 66-79 - Khaled Harfoush, Azer Bestavros, John W. Byers:
Measuring capacity bandwidth of targeted path segments. 80-92 - Piet Van Mieghem, Huijuan Wang:
The observable part of a network. 93-105 - Han Hee Song, Lili Qiu, Yin Zhang:
NetQuest: a flexible framework for large-scale network measurement. 106-119 - György Terdik, Tibor Gyires:
Lévy flights and fractal modeling of internet traffic. 120-129 - Reaz Ahmed, Raouf Boutaba:
Plexus: a scalable peer-to-peer protocol enabling efficient subset search. 130-143 - Zhongmei Yao, Xiaoming Wang, Derek Leonard, Dmitri Loguinov:
Node isolation model and age-based neighbor selection in unstructured P2P networks. 144-157 - Xiaoming Fu, Henning Schulzrinne, Hannes Tschofenig, Christian Dickmann, Dieter Hogrefe:
Overhead and performance study of the general internet signaling transport (GIST) protocol. 158-171 - Pascal von Rickenbach, Roger Wattenhofer, Aaron Zollinger:
Algorithmic models of interference in wireless ad hoc and sensor networks. 172-185 - Khaled Elmeleegy, Alan L. Cox, T. S. Eugene Ng:
Understanding and mitigating the effects of count to infinity in Ethernet networks. 186-199 - Jie Lian, Yunhao Liu, Kshirasagar Naik, Lei Chen:
Virtual surrounding face geocasting in wireless ad hoc and sensor networks. 200-211 - Sastry Kompella, Shiwen Mao, Yiwei Thomas Hou, Hanif D. Sherali:
On path selection and rate allocation for video in wireless mesh networks. 212-224 - Teerawat Issariyakul, Vikram Krishnamurthy:
Amplify-and-forward cooperative diversity wireless networks: model, analysis, and monotonicity properties. 225-238 - Anand Srinivas, Gil Zussman, Eytan H. Modiano:
Construction and Maintenance of Wireless Mobile Backbone Networks. 239-252 - Hongbin Luo, Lemin Li, Hongfang Yu:
Routing connections with differentiated reliability requirements in WDM mesh networks. 253-266 - Stefano Avallone, Ian F. Akyildiz, Giorgio Ventre:
A channel and rate assignment algorithm and a layer-2.5 forwarding paradigm for multi-radio wireless mesh networks. 267-280 - Vahid Tabatabaee, Leandros Tassiulas:
MNCM: a critical node matching approach to scheduling for input buffered switches with no speedup. 294-304 - Andrew Zalesky:
To burst or circuit switch? 305-318 - Guanglei Liu, Chuanyi Ji:
Scalability of network-failure resilience: analysis using multi-layer probabilistic graphical models. 319-331 - Giridhar Jayavelu, Srinivasan Ramasubramanian, Ossama Younis:
Maintaining colored trees for disjoint multipath routing under node failures. 346-359
Volume 17, Number 2, April 2009
- Bin Fan, John C. S. Lui, Dah-Ming Chiu:
The design trade-offs of BitTorrent-like file sharing protocols. 365-376 - Daniel Stutzbach, Reza Rejaie, Nick G. Duffield, Subhabrata Sen, Walter Willinger:
On unbiased sampling for unstructured peer-to-peer networks. 377-390 - Yihua He, Georgos Siganos, Michalis Faloutsos, Srikanth V. Krishnamurthy:
Lord of the links: a framework for discovering missing links in the internet topology. 391-404 - Andrea Bianco, Gianluca Mardente, Marco Mellia, Maurizio M. Munafò, Luca Muscariello:
Web user-session inference by means of clustering techniques. 405-416 - Darryl Veitch, Julien Ridoux, Satish Babu Korada:
Robust synchronization of absolute and difference clocks over networks. 417-430 - Björn Scheuermann, Wolfgang Kiess, Magnus Roos, Florian Jarre, Martin Mauve:
On the time synchronization of distributed log files in networks with local broadcast media. 431-444 - Ricardo V. Oliveira, Beichuan Zhang, Dan Pei, Lixia Zhang:
Quantifying path exploration in the internet. 445-458 - Murali S. Kodialam, T. V. Lakshman, James B. Orlin, Sudipta Sengupta:
Oblivious routing of highly variable traffic in service overlays and IP backbones. 459-472 - Amund Kvalbein, Audun Fosselie Hansen, Tarik Cicic, Stein Gjessing, Olav Lysne:
Multiple routing configurations for fast IP network recovery. 473-486 - Reuven Cohen, Gabi Nakibly:
A traffic engineering approach for placement and selection of network services. 487-500 - Geoffrey Goodell, Mema Roussopoulos, Scott O. Bradner:
A directory service for perspective access networks. 501-514 - Pradeep Kyasanur, Nitin H. Vaidya:
Capacity of multichannel wireless networks under the protocol model. 515-527 - Bhaskaran Raman, Kameswari Chebrolu, Dattatraya Y. Gokhale, Sayandeep Sen:
On the feasibility of the link abstraction in wireless mesh networks. 528-541 - Bow-Nan Cheng, Murat Yuksel, Shivkumar Kalyanaraman:
Orthogonal rendezvous routing protocol for wireless mesh networks. 542-555 - Mehdi Rasti, Ahmad R. Sharafat, Babak Seyfe:
Pareto-efficient and goal-driven power control in wireless networks: a game-theoretic approach with a novel pricing scheme. 556-569 - Reuven Cohen, Boris Kapchits:
An optimal wake-up scheduling algorithm for minimizing energy consumption while limiting maximum delay in a mesh sensor network. 570-581 - Hanan Shpungin, Michael Segal:
Low-energy fault-tolerant bounded-hop broadcast in wireless networks. 582-590 - Tianji Li, Qiang Ni, David Malone, Douglas J. Leith, Yang Xiao, Thierry Turletti:
Aggregation with fragment retransmission for very high-speed WLANs. 591-604 - Alvaro A. Cárdenas, Svetlana Radosavac, John S. Baras:
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments. 605-617 - Mingyu Chen, Xingzhe Fan, Manohar N. Murthi, T. Dilusha Wickramarathna, Kamal Premaratne:
Normalized queueing delay: congestion control jointly utilizing delay and marking. 618-631 - Bin Wu, Kwan L. Yeung, Mounir Hamdi, Xin Li:
Minimizing internal speedup for performance guaranteed switches with optical fabrics. 632-645 - Matthew Andrews, Lisa Zhang:
Complexity of wavelength assignment in optical network optimization. 646-657 - Kalyan Kuppuswamy, Daniel C. Lee:
An analytic approach to efficiently computing call blocking probabilities for multiclass WDM networks. 658-670 - Abdelhamid E. Eshoul, Hussein T. Mouftah:
Survivability approaches using p-cycles in WDM mesh networks under static traffic. 671-683
Volume 17, Number 3, June 2009
- Ioannis Ch. Paschalidis, Georgios Smaragdakis:
Spatio-temporal network anomaly detection by assessing deviations of empirical measures. 685-697 - Yan Hu, Dah-Ming Chiu, John C. S. Lui:
Entropy based adaptive flow aggregation. 698-711 - Kashi Venkatesh Vishwanath, Amin Vahdat:
Swing: realistic and responsive network traffic generation. 712-725 - Xiaoming Wang, Zhongmei Yao, Dmitri Loguinov:
Residual-based estimation of peer and link lifetimes in P2P networks. 726-739 - Feng Wang, Jian Qiu, Lixin Gao, Jia Wang:
On understanding transient interdomain routing failures. 740-751 - Murali S. Kodialam, T. V. Lakshman, Sudipta Sengupta:
Locally restorable routing of highly variable traffic. 752-763 - Barath Raghavan, Patrick Verkaik, Alex C. Snoeren:
Secure and policy-compliant source routing. 764-777 - Jian Chu, Chin-Tau Lea:
Optimal link weights for IP-based networks supporting hose-model VPNs. 778-788 - Nicolas Hohn, Konstantina Papagiannaki, Darryl Veitch:
Capturing router congestion and delay. 789-802 - Wencheng Lu, Sartaj Sahni:
Succinct representation of static packet classifiers. 803-816 - Jun Li, Yiqiang Q. Zhao:
Resequencing analysis of stop-and-wait ARQ for parallel multichannel communications. 817-830 - Vincent Borrel, Franck Legendre, Marcelo Dias de Amorim, Serge Fdida:
SIMPS: using sociology for personal mobility. 831-842 - Saurabh Ganeriwal, Ilias Tsigkogiannis, Hohyun Shim, Vlasios Tsiatsis, Mani B. Srivastava, Deepak Ganesan:
Estimating clock uncertainty for efficient duty-cycling in sensor networks. 843-856 - Sungoh Kwon, Ness B. Shroff:
Analysis of shortest path routing for large multi-hop wireless networks. 857-869 - Petar Djukic, Shahrokh Valaee:
Delay aware link scheduling for multi-hop TDMA wireless networks. 870-883 - Claudio Cicconetti, Ian F. Akyildiz, Luciano Lenzini:
FEBA: a bandwidth allocation algorithm for service differentiation in IEEE 802.16 mesh networks. 884-897 - Murtaza Zafer, Eytan H. Modiano:
A calculus approach to energy-efficient data transmission with quality-of-service constraints. 898-911 - Chee-Wei Tan, Daniel Pérez Palomar, Mung Chiang:
Energy-robustness tradeoff in cellular network power control. 912-925 - Kae Won Choi, Wha Sook Jeon, Dong Geun Jeong:
Resource allocation in OFDMA wireless communications systems supporting multimedia services. 926-935 - Richard T. B. Ma, Vishal Misra, Dan Rubenstein:
An analysis of generalized slotted-Aloha protocols. 936-949 - Xiang-Yang Li:
Multicast capacity of wireless ad hoc networks. 950-961 - Yuan-Cheng Lai, Chih-Chung Lin:
Two blocking algorithms on adaptive binary splitting: single and pair resolutions for RFID tag identification. 962-975 - Kevin Ross, Nicholas Bambos:
Projective cone scheduling (PCS) algorithms for packet switches of maximal throughput. 976-989 - Hung Q. Ngo, Yang Wang, Dazhen Pan:
Rearrangeable and nonblocking [w, f] -distributors. 990-1001 - Rodney Van Meter, Thaddeus D. Ladd, W. J. Munro, Kae Nemoto:
System design for a long-line quantum repeater. 1002-1013
Volume 17, Number 4, August 2009
- Jonathan S. Turner:
Strong performance guarantees for asynchronous buffered crossbar scheduler. 1017-1028 - Banit Agrawal, Timothy Sherwood:
High-bandwidth network memory system through virtual pipelines. 1029-1041 - Michael Menth, Andreas Binzenhöfer, Stefan Mühleck:
Source models for speech traffic revisited. 1042-1051 - Nazanin Magharei, Reza Rejaie:
PRIME: peer-to-peer receiver-driven mesh-based streaming. 1052-1065 - Vijay Sivaraman, Hossam A. ElGindy, David Moreland, Diethelm Ostry:
Packet pacing in small buffer optical packet switched networks. 1066-1079 - Satyajeet Ahuja, Srinivasan Ramasubramanian, Marwan Krunz:
Single-link failure detection in all-optical networks using monitoring cycles and paths. 1080-1093 - Suman Sarkar, Hong-Hsu Yen, Sudhir S. Dixit, Biswanath Mukherjee:
Hybrid wireless-optical broadband access network (WOBAN): network planning using Lagrangean relaxation. 1094-1105 - Pan Li, Chi Zhang, Yuguang Fang:
Asymptotic connectivity in wireless ad hoc networks using directional antennas. 1106-1117 - Apoorva Jindal, Konstantinos Psounis:
The achievable rate region of 802.11-scheduled multihop networks. 1118-1131 - Changhee Joo, Xiaojun Lin, Ness B. Shroff:
Understanding the capacity region of the Greedy maximal scheduling algorithm in multihop wireless networks. 1132-1145 - Michael J. Neely:
Delay analysis for maximal scheduling with flow control in wireless networks with bursty traffic. 1146-1159 - Paramvir Bahl, Ranveer Chandra, Patrick P. C. Lee, Vishal Misra, Jitendra Padhye, Dan Rubenstein, Yan Yu:
Opportunistic use of client repeaters to improve performance of WLANs. 1160-1171 - Kyu-Han Kim, Kang G. Shin:
On accurate and asymmetry-aware measurement of link quality in wireless mesh networks. 1172-1185 - Mehmet C. Vuran, Ian F. Akyildiz:
Error control in wireless sensor networks: a cross layer analysis. 1186-1199 - Shamik Sengupta, Mainak Chatterjee:
An economic framework for dynamic spectrum access and service pricing. 1200-1213 - Gwillerm Froc, Issam Mabrouki, Xavier Lagrange:
Design and performance of wireless data gathering networks based on unicast random walk routing. 1214-1227 - Ming-Jer Tsai, Hong-Yen Yang, Bing-Hong Liu, Wen-Qian Huang:
Virtual-coordinate-based delivery-guaranteed routing protocol in wireless sensor networks. 1228-1241 - Joon Ahn, Bhaskar Krishnamachari:
Scaling laws for data-centric storage and querying in wireless sensor networks. 1242-1255 - Ming Li, Deepak Ganesan, Prashant J. Shenoy:
PRESTO: feedback-driven data management in sensor networks. 1256-1269 - Martín Casado, Michael J. Freedman, Justin Pettit, Jianying Luo, Natasha Gude, Nick McKeown, Scott Shenker:
Rethinking enterprise network control. 1270-1283 - Katerina J. Argyraki, David R. Cheriton:
Scalable network-layer defense against internet bandwidth-flooding attacks. 1284-1297 - Sabyasachi Roy, Himabindu Pucha, Zheng Zhang, Y. Charlie Hu, Lili Qiu:
On the placement of infrastructure overlay nodes. 1298-1311 - Jayakrishnan Nair, D. Manjunath:
Distributed iterative optimal resource allocation with concurrent updates of routing and flow control variables. 1312-1325 - Hiroyuki Okamura, Tadashi Dohi, Kishor S. Trivedi:
Markovian arrival process parameter estimation with group data. 1326-1339 - François Baccelli, Sridhar Machiraju, Darryl Veitch, Jean Bolot:
The role of PASTA in network measurement. 1340-1353
Volume 17, Number 5, October 2009
- Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-Yeol Ahn, Sue B. Moon:
Analyzing the video popularity characteristics of large-scale user generated content systems. 1357-1370 - Moritz Steiner, Taoufik En-Najjary, Ernst W. Biersack:
Long term study of peer behavior in the KAD DHT. 1371-1384 - Yigal Bejerano:
Taking the skeletons out of the closets: a simple and efficient topology discovery scheme for large ethernet LANs. 1385-1398 - Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu:
Scalable key management algorithms for location-based services. 1399-1412 - Fernando Paganini, Enrique Mallada:
A unified approach to congestion control and node-based multipath routing. 1413-1426 - Murali S. Kodialam, T. V. Lakshman, Sudipta Sengupta:
Guaranteed performance routing of unpredictable traffic with fast path restoration. 1427-1438 - Xin Yuan, Wickus Nienaber, Zhenhai Duan, Rami G. Melhem:
Oblivious routing in fat-tree based system area networks with uncertain traffic demands. 1439-1452 - Holger Boche, Martin Schubert:
Nash bargaining and proportional fairness for wireless systems. 1453-1466 - Loc Bui, Sujay Sanghavi, R. Srikant:
Distributed link scheduling with constant overhead. 1467-1480 - Changhee Joo, Ness B. Shroff:
Performance of random access scheduling schemes in multi-hop wireless networks. 1481-1493 - Zhenzhen Ye, Alhussein A. Abouzeid, Jing Ai:
Optimal stochastic policies for distributed data aggregation in wireless sensor networks. 1494-1507 - Yan Wu, Sonia Fahmy, Ness B. Shroff:
Optimal sleep/wake scheduling for time-synchronized sensor networks with QoS guarantees. 1508-1521 - Michele Garetto, Paolo Giaccone, Emilio Leonardi:
Capacity scaling in ad hoc networks with heterogeneous mobile nodes: the super-critical regime. 1522-1535 - Suli Zhao, Dipankar Raychaudhuri:
Scalability and performance evaluation of hierarchical hybrid wireless networks. 1536-1549 - Hui Ma, Rajiv Vijayakumar, Sumit Roy, Jing Zhu:
Optimizing 802.11 wireless mesh networks based on physical carrier sensing. 1550-1563 - Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ahmed Helmy:
Modeling spatial and temporal dependencies of user mobility in wireless mobile networks. 1564-1577 - Han Cai, Do Young Eun:
Crossing over the bounded domain: from exponential to power-law intermeeting time in mobile ad hoc networks. 1578-1591 - Wei Wang, Mehul Motani, Vikram Srinivasan:
Opportunistic energy-efficient contact probing in delay-tolerant applications. 1592-1605 - Soung Chang Liew, Ying Jun Zhang, Da Rui Chen:
Bounded-mean-delay throughput and nonstarvation conditions in Aloha network. 1606-1618 - Stefan Alexandru Pascu, Ahmed A. El-Amawy:
On conflict-free all-to-all broadcast in one-hop optical networks of arbitrary topologies. 1619-1630 - Michel Mandjes, Remco van de Meent:
Resource dimensioning through buffer sampling. 1631-1644 - Ravi S. Prasad, Constantine Dovrolis, Marina Thottan:
Router buffer sizing for TCP traffic and the role of the output/input capacity ratio. 1645-1658 - Chao-Lin Yu, Cheng-Shang Chang, Duan-Shin Lee:
CR switch: a load-balanced switch with contention and reservation. 1659-1671 - Georgios Y. Lazarou, Julie Baca, Victor S. Frost, Joseph B. Evans:
Describing network traffic using the index of variability. 1672-1683 - Reuven Cohen, Niloofar Fazlollahi, David Starobinski:
Path switching and grading algorithms for advance channel reservation architectures. 1684-1695
Volume 17, Number 6, December 2009
- Lachlan L. H. Andrew, Steven H. Low, Bartek P. Wydrowski:
Understanding XCP: equilibrium and fairness. 1697-1710 - Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck:
Proactive surge protection: a defense mechanism for bandwidth-based attacks. 1711-1723 - Yao Zhao, Yan Chen, David Bindel:
Towards unbiased end-to-end network diagnosis. 1724-1737 - Mehmet Hadi Gunes, Kamil Saraç:
Resolving IP aliases in building traceroute-based internet maps. 1738-1751 - Ao-Jan Su, David R. Choffnes, Aleksandar Kuzmanovic, Fabián E. Bustamante:
Drafting behind Akamai: inferring network conditions based on CDN redirections. 1752-1765 - Michael Sirivianos, Xiaowei Yang, Stanislaw Jarecki:
Robust and efficient incentives for cooperative content distribution. 1766-1779 - George N. Rouskas, Nikhil Baradwaj:
On bandwidth tiered service. 1780-1793 - Huseyin Mutlu, Murat Alanyali, David Starobinski:
Spot pricing of secondary spectrum access in wireless cellular networks. 1794-1804 - Nicholas B. Chang, Mingyan Liu:
Optimal channel probing and transmission scheduling for opportunistic spectrum access. 1805-1818 - Shrutivandana Sharma, Demosthenis Teneketzis:
An externalities-based decentralized optimal power allocation algorithm for wireless networks. 1819-1831 - Omer Gurewitz, Vincenzo Mancuso, Jingpu Shi, Edward W. Knightly:
Measurement and modeling of the origins of starvation of congestion-controlled flows in wireless mesh networks. 1832-1845 - Abhinav Gupta, Xiaojun Lin, R. Srikant:
Low-complexity distributed scheduling algorithms for wireless networks. 1846-1859 - Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa:
On stability region and delay performance of linear-memory randomized scheduling for time-varying networks. 1860-1873 - Xiaojun Lin, Shahzada Rasool:
Distributed and provably efficient algorithms for joint channel-assignment, scheduling, and routing in multichannel ad hoc wireless networks. 1874-1887 - Michele Garetto, Paolo Giaccone, Emilio Leonardi:
Capacity scaling in ad hoc networks with heterogeneous mobile nodes: the subcritical regime. 1888-1901 - Rik Sarkar, Xianjin Zhu, Jie Gao:
Double rulings for information brokerage in sensor networks. 1902-1915 - Christopher J. Martinez, Devang Pandya, Wei-Ming Lin:
On designing fast nonuniformly distributed IP address lookup hashing algorithms. 1916-1925 - Lynn Choi, Hyogon Kim, Sunil Kim, Moon Hae Kim:
Scalable packet classification through rulebase partitioning using the maximum entropy hashing. 1926-1935 - Mario Baldi, Guido Marchetto:
Pipeline forwarding of packets based on a low-accuracy network-distributed common time reference. 1936-1949 - Michael Menth, Michael Duelli, Rüdiger Martin, Jens Milbrandt:
Resilience analysis of packet-witched communication networks. 1950-1963 - Srinivasan Seetharaman, Volker Hilt, Markus Hofmann, Mostafa H. Ammar:
Resolving cross-layer conflict between overlay routing and traffic engineering. 1964-1977 - Amir Gourgy, Ted H. Szymanski, Douglas G. Down:
On tracking the behavior of an output-queued switch using an input-queued switch. 1978-1988 - Smita Rai, Ching-Fong Su, Biswanath Mukherjee:
On provisioning in all-optical networks: an impairment-aware approach. 1989-2001 - Onur Turkcu, Suresh Subramaniam:
Performance of optical networks with limited reconfigurability. 2002-2013 - Yi-Ting Chen, Jay Cheng, Duan-Shin Lee:
Constructions of linear compressors, nonovertaking delay lines, and flexible delay lines for optical packet switching. 2014-2027
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.